ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login
Archived Papers for Journal

International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) >>

Vol.4, No.2

Publisher: Navneet Singh Sikarwar

Publishing Date: 2015-05-20

  1. Optimization Design of Band Pass Filter in The Infrared Region

    Authors: Saeed N. Turki

  2. Intelligence Techniques for e-government applications

    Authors: HANAA. M. SAID; MOHAMED HAMDY; RANIA El GOHARY; ABDEL-BADEEH M. SALEM

  3. An improved HMF with PDE for Cellular Images

    Authors: Garima Goyal

  4. A Survey on Various Broadcast Techniques for MANET

    Authors: AKSHEET SADARSANIYA; ROHIT SRIVASTAVA

  5. DCT Based Grey Scale Still Image Watermarking Using 1-D Walsh Code and Biometric Protection

    Authors: B.P.Mishra; Dr.H.N.Pratihari; Dr.P.Das

  6. PERFORMANCE EVALUATION AND EMISSION CHARACTERISTICS OF A WASTE TRANSFORMER OIL AS AN ALTERNATIVE FUEL FOR DIESEL ENGINE

    Authors: E SAIDULU; G.S.GURU DATTATREYA

  7. IEAACK Implementation of A New Security Intrusion Detection System by Using Hybrid Cryptographic Algorithm for MANET

    Authors: Ms Priyanka P Kulkarni; Prof G.M.Bhandari

  8. Assessing ICT Policy Development and Implementation in Developing Countries: a case study from Morocco

    Authors: Driss Kettani

  9. A stochastic model for feature extraction in Time Series Data Mining and its Engineering applications using remote sensing technique

    Authors: R.K Singh; Sunil Bhaskarn

  10. S R S for responsive design environment: Generic Medicine Mobile Website -A portal to facilitate updated information about generic medicine

    Authors: Prof.Chaitali Gadekar

  11. NEOTERIC INNOVATION IN GI-FI TECHNOLOGY

    Authors: Nandhakumar P; Abhishek Pratap Singh

  12. Modify Speech Cryptosystem Based on Shuffling Overlapping Blocks Technique

    Authors: Hala B.Abdul Wahab; Sundus I. Mahdi

  13. FLASHBACK & ARTIFACTS IN IMAGE CLASSIFICATION DESCRIPTORS

    Authors: Parul Prashar; Amit Kumar

  14. Modified Rc4 Dual Key algorithm based on Irreducible Polynomial

    Authors: Abdul Monem Saleh Rahma; Zainab Mohammed Hussein

  15. Avoid Women Harassment through Web Browser

    Authors: Prof.Aniruddha Madhav Phadke

  16. The Impact of Mobile and Internet Based Social Network Technologies on Student Education

    Authors: Mahabaleshwar. S. Kabbur; Savitri K

  17. A Novel Biometric Authentication for ATM Security

    Authors: SWATHY.G .S; RASMI .P .S

  18. Digital Signature based secure XML emails

    Authors: Srushti Arekar; Prajakta Jagtap; Priyanka Jagtap; Sharanya Shivakumar

  19. Digital Signature based secure XML emails

    Authors: Srushti Arekar; Prajakta Jagtap; Priyanka Jagtap; Sharanya Shivakumar

  20. Machine learning In E- Technologies

    Authors: HANAA. M. SAID; ABDEL-BADEEH M. SALEM

  21. Review on various Cyber Crime, Hacker, and Authorities

    Authors: Ms Divya Sharma

  22. NOTES ON AVERAGE QUERY RESPONSE TIME IN DBMS

    Authors: SARIKA SAINI

  23. Image Search Re-ranking based on Prototype

    Authors: Deepali.M.Jalkote; Pravin P.Kalyankar

  24. Exploring Different Aspects of Social Network Analysis Using Web Mining Techniques

    Authors: Hilal Ahmad Khanday; Rana Hashmy

  25. FAC-MACS: Fortified Access Control for Multi-Authority Cloud Storage Using CPABE

    Authors: Bhuvaneswari Thangaraj; S.Umarani; D.Sharmila

  26. Data Cleaning Using Clustering Based Data Mining Technique

    Authors: Sujata Joshi; Usha T.

  27. Hindi-English Translation Memory System

    Authors: Nandita Srivastava; Priya Singh; Sukanya Chauhan; Shashi Pal Singh; Ajai Kumar; Hemant Darbari

  28. Cut Detection and Re-routing in wireless sensor networks

    Authors: Mrs.Dipali Sonawane; Alka Khade; Seema Biday

  29. Survey on Different Techniques in SQL to Prepare Dataset for Data Mining

    Authors: Shaila Eksambekar; Suhasini Itkar

  30. A NEW APPROACH TO SECURITY IN AD HOC NETWORKS

    Authors: Rashmi Hegde; H.D.Phaneendra

  31. Text Hiding Based On Hue Content In HSV Color Space

    Authors: Ahmed S. Abdalluh

  32. GRAPHICAL BASED PASSWORD USING KEYSTROKE DYNAMIC AUTHENTICATION SYSTEM FOR BANKING APPLICATION

    Authors: Kajal Birdawade; Varsha Ingale; Manisha Lole; Vrushali Mande; Deepti Nirwal

  33. Data Protection in Mac OS X

    Authors: Neha Setia; Tarun Dalal

  34. Active Queue Management in MANETs ? A Primer on Network Performance optimization

    Authors: Shallu Bedi; Gagangeet Singh Aujla; Sahil Vashist

  35. A Policy-Based Framework for Managing Information Security and Privacy Risks in BYOD Environments

    Authors: Abubakar Bello Garba; Jocelyn Armarego; David Murray

  36. A Survey On Detection Of Mining Service Information Discovery Using SASF Crawler

    Authors: Suganiya.R; Asst.Haripriya.K

  37. NATURAL LANGUAGE PROCESSING USING ARTIFICIAL INTELLIGENCE

    Authors: Unnati Dhavare; Umesh Kulkarn

  38. A Synthesize Virtual Machine Provisioning Mechanism for Cloud Data Center

    Authors: Ganesh Kumar Vishwakarma; Neelam Sain; Anjul K S Rai

  39. Automated Self-Billing System Using RFID Technology

    Authors: Prachi Bhatwal; Onish Chamoli

  40. Automated Self-Billing System Using RFID Technology

    Authors: Prachi Bhatwal; Onish Chamoli

  41. A Review On Modern Secure Mosaic Video Generation For Secure Video Transmission

    Authors: Swapnil Patil; Prof.A.A Deshmukh